Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deep GRU-CNN Model for COVID-19 Detection From Chest X-Rays Data., , , , , , , , and . IEEE Access, (2022)Super forecasting the technological singularity risks from artificial intelligence., , , and . CoRR, (2023)Trustworthy Cross-Border Interoperable Identity System for Developing Countries., , , and . CoRR, (2023)Do the Right Thing: A Privacy Policy Adherence Analysis of over Two Million Apps in Apple iOS App Store., , , and . Sensors, 22 (22): 8964 (2022)An Evolutionary-Based Approach to Learning Multiple Decision Models from Underrepresented Data., , and . ICNC (1), page 40-44. IEEE Computer Society, (2008)Zero-Knowledge Proofs based delegation authentication for Industrial Internet of Things in certificateless proxy signatures., , , , and . IOTSMS, page 8-14. IEEE, (2023)Can a Mobile Game Teach Computer Users to Thwart Phishing Attacks?, , and . CoRR, (2015)Determining Roots of Real-Valued Functions of a Single Variable over a Distributed Network., , and . PARELEC, page 323-329. IEEE Computer Society, (2002)Parallel Solutions of Large Dense Linear Systems Using MPI., and . PARELEC, page 312-317. IEEE Computer Society, (2002)Network Performance Optimization: A Case Study of Enterprise Network Simulated in OPNET., , , and . FIT, page 57-62. IEEE Computer Society, (2011)